Premium Essay

Identify Chain of Custody Roles and Requirements

In:

Submitted By zbiizy
Words 301
Pages 2
Identify Chain of Custody Roles and Requirements

Marta then pass it on and sign it to me, with Pat being a cosigner after which I securely take it to a secure location in the premises waiting to load and transport them to AAA premises.
5 Laptops onsite obtained controlled and secured by Sukhrit who after taking the serial numbers and the case numbers hand and sign it over to Marta on the crime scene

Pat and I escort the evidence up to the AAA offices where we also sign and the management sign the laptops and lock them in a secure room at the AAA premises waiting to be submitted to the court

General Chain of custody form Evidence/Property Custody - clients premise Name | Tracking # 0025/2013 | Name of Recipient facility - AAA | Location – Atlanta | Marta – IT Security Team Lead Suhkrit – IT Staff Member | Address 276 Towne lake Pkwy | Location from where obtained- Clients premise | Reason Obtained –Security Breach | Date/Time obtained- 06/09/2013 1500hrs | | Item # | Quantity | 001253/2013 | 1 | 0014357/2012 | 1 | 0234986/2008 | 1 | 0256810/2008 | 1 | 0027891/2011 | 1 | | Description of articles | S/N 2378W890C | Perfect condition | S/N 678123Z19Q | Perfect condition with a little cosmetic ware at the back cover | S/N 76890125W1 | Perfect condition with scratches on the front bezel | S/N 427810D09R2 | Perfect condition | S/N 100789C0861K | Perfect condition | | Item # | Released by | Received by | | Signature | Signature | 001253/2013 | 0014357/2012 | 0234986/2008 | 0256810/2008 | 0027891/2011 | | Suhkrit | Marta | | Signature | Signature | 001253/2013 | 0014357/2012 | 0234986/2008 | 0256810/2008 | 0027891/2011 | | Dennis | Pat | | Signature | Signature | 001253/2013 | 0014357/2012 |

Similar Documents

Free Essay

Test1

...* Dayani Herrera * Week 2 Assignment The Chain of Custody Process Limiting Access to the Evidence * When a piece of evidence is collected, there are numerous individuals who will have access to it before the case goes to trial. The investigator, evidence technician,
property officer, laboratory technician, prosecutor and defense attorney all may have custody. Each individual in this chain has a responsibility for the safe-keeping and preservation of the evidence while it is in their possession.

 Initial Collection * Before any evidence is removed from the crime scene, there should be an evidence custodian designated as the person in charge of initiating and maintaining all evidence. This person needs to document the crime scene location, as well as his time of arrival. There should also be a crime scene log established, witness list and documentation of identification, arrival and departure times of all law enforcement crime scene personnel.

 Record Keeping * The investigator who handles the evidence initially should affix her name, badge number and assignment to the package containing the evidence. When the evidence leaves the officer's possession, a record should be made in her case notes identifying to whom the evidence was given, the date and time, and the reason it was turned over. A signed receipt should be obtained from the person accepting the evidence and another signed receipt should be obtained when the item is returned. When the item...

Words: 667 - Pages: 3

Premium Essay

Security Policies and Implementation Week Four Lab

...------------------------------------------------- Sara ------------------------------------------------- 10/11/2014 ------------------------------------------------- Week 4 Laboratory: Part 1 Part 1: Identify Necessary Policies for Business Continuity - BIA & Recovery Time Objectives Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the major elements of a Business Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time...

Words: 1852 - Pages: 8

Free Essay

Logistics

...newly released standard for a company's EMS. Being certified by a third-party registrar as compliant would ensure the customer the MBP was environmentally responsible. b. Each industry has its own set of standards different from others. The region that it is also an impact. (Clean and Green vs. Industry Centers). 2. How does the “SmartWood” or FSC certification differ from ISO 14001 certification? a. SmartWood assures customers the “chain-of-custody” standards for forestry certification programs worldwide are followed. The importance of FSC certification to wood processors, assures product suppliers were managed in an environmentally friendly manner. b.ISO 14001 are the international standards for evaluating a company's environmental management systems(EMS'S) by third party registrars, assuring the customer that MBP's suppliers are environmentally responsible. 3. What role do “aspects” and “impacts” have in ISO 14001? What did Josh discover about the “right” and “wrong” way to identify environmental aspects? a. You must identify the aspects that need to be evaluated for significant impact on the environment. Impacts are the outcome of the aspects. Example, Trucks use fuel, and this add carbon dioxide to the environment. MBP but define an environment management program to correct these issues. This must be done within a time frame to archive targets that...

Words: 644 - Pages: 3

Premium Essay

Security Pllus Exam Essentials

...involves good design, implementation, and maintenance. The information in your organization is potentially vulnerable to both internal and external threats. Identify these threats and create methods of countering them before they happen. Be able to identify the potential physical, operational, and management policy decisions that affect your information security efforts. It isn’t good enough to have a plan if the plan is unsound or has gaping holes. You must make sure that the plans you develop and the procedures you follow to ensure security make sense for the organization and are effective in addressing the organization’s needs. Be able to explain the relative advantages of the technologies available to you for authentication. You have many tools available to establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. This area is referred to as I&A. Be able to explain the relative capabilities of the technologies available to you for network security. In most situations, you can create virtual LANs, create connections that are encrypted, and isolate high-risk assets from low-risk assets. You can do so using tunneling, DMZs, and network segmenting. Be able to identify and describe the goals of information security. The three primary goals of information security are prevention, detection, and response. Your policies and systems...

Words: 5056 - Pages: 21

Free Essay

Paralegal Studies

...1. Explain what you think the role of a paralegal is in the litigation process. Reflect on your own personal skills and if you like litigation practice. The role of a paralegal in the litigation process is to provide a win-win solution to the cost of legal services as most people cannot afford the services of a lawyer. Paralegals engage in substantive legal work, the kind of work that lawyers do with certain limitations and prohibitions. Based on my own personal skills such as filing of small claims, paralegals are engaged in real legal work, provided as paralegals are appropriately supervised, the lawyers for whom paralegals work are able to engage in other legal work. I like litigation practice because paralegals are of service to the clients. Clients will receive a smaller bill when legal assistants are used effectively because the work of legal assistants is billed at a lesser rate than that of lawyers. The use of paralegals allows more members of society to be able to afford legal services, while at the same time allows employing lawyers at private law firms to increase their earnings. Paralegal is a highly demand profession which makes me reflect that litigation practice is a rewarding career. 2. As a paralegal what documents should you attempt to obtain before a lawsuit is filed during the informal fact-gathering stage? What sources are available to you to locate these documents? The attorney’s work product, now called “trial preparation materials.”...

Words: 3519 - Pages: 15

Free Essay

Accy 310 Final Exam Sg

...Chapter 1—AIS overview (3 Questions = 4.5 points) Purpose of/value provided by AIS 1. Improving the quality and reducing the costs of products or service 2. Improve efficiency and effectiveness of the value chain and supply chain 3. Share knowledge 4. Improve the internal control structure 5. Improve decision making Key Role if the AIS 1. Collecting and storing data 2. Providing information for decisions 3. Safeguarding assets Value Chain Activities 1. Inbound Logistics------ receiving and storage 2. Operations -------------- manufacturing and repackaging 3. Outbound Logistics---- distribution shipping 4. Marketing & Sales------ advertising, selling 5. Service-------------------- repair, maintenance Characteristic of Useful Information 1. Relevant 2. Reliable 3. Timely 4. Verifiable 5. Understandable 6. Accessible 7. Complete Chapter 2/SUA Purpose/use of general ledger, subsidiary ledgers, special journals and cash prelist General Ledger= contains summary level data for every asset, liability, equity and revenue, and expense account...(accounts receivable) Subsidiary Ledger= contains detailed data for any general ledger account with many individualized subaccounts.... (Separate account for each accounts receivable) General Journal= used to record infrequent or non-routine transaction, such as loan payments Specialized Journal= records large numbers of repetitive...

Words: 2842 - Pages: 12

Premium Essay

Lab 9

...help desk to have the user cease all activity on the workstation and to wait for you to arrive at the physical desktop location. The workstation must first be physically disconnected from the network leaving it physically isolated but now powered off. It should be left in its steady-state. This isolates the contaminated workstation from the organization’s network and Internet, as well as preventing the contamination from spreading. Logs, memory forensics, footprints, and other malicious activity must be kept in its steady-state untouched. Forensic images of the logs should be performed along with a memory forensics scan. Anti-virus and anti-malicious software removal tools can be enabled from a CD-drive 2. When an anti-virus application identifies a virus and quarantines this file, does this mean the computer is eradicated of the virus and any malicious software? No, many times virus and trojans can leave residuals or wreak havoc on other processes. It is important to note that the quarantined file is never off the computer until cleaned out or deleted – it’s like putting the unknown file in a holding tank until you can assess what it is and how to eradicate. 3. Where would you check for processes and services enabled in the background of your Student VM workstation? Windows Task Manager > Applications > Processes > Services will display all the enable applications and processes on your workstation. Hidden trojans and unwanted executables like keyboard buffers, scripts...

Words: 712 - Pages: 3

Premium Essay

Arilines

...purchase enough fuel at a reasonable price to store for several months, the company could find themselves well over budget potentially grounding aircraft.| Likelihood of Occurrence|High - Crude oil is traded on the stock market daily with prices fluctuating based on supply and demand.| Severity of Impact|High - If MDA is not able to manage the budget, they could find themselves in a financial bind.| Controllability|Med - The hedging program is intended to mitigate risks associated with increasing crude oil prices and is also intended to make it easier to plan for future fuel costs.| Risk Response|Mitigate - The acquisition and purchase of a refinery were researched by logistics managers that monitored and studied the aircraft fuel supply chain, which discovered that over the years refiners have benefited from increased margins on the sale of fuel. This decision will save millions of dollars and insure a reliable fuel supply for the domestic fleet. The refinery equipment will require some changes to produce jet fuel and also maximize the output.| Risk 2|Pilot Retention| Description|MDA employs approximately 12400 pilots. The average age for 70% of the pilots is 50 years old and approaching retirement in the next decade.| Source|Pilots are beginning to reach retirement age and there aren’t enough pilots in the training...

Words: 4899 - Pages: 20

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104

Premium Essay

Bridging Information Systems in Business, Credit Exception Tracking System

...Abstract This report aims to identify the business value of information system in an organization. The organization that has been focused is HSBC Bangladesh. The CRM department of HSBC Bangladesh had recently incorporated a new software, namely “Credit Exception Tracking System”. This report primarily focuses on the situation of the bank prior to the incorporation of this information system in the CRM department, and it expands with a qualitative and quantitative analysis of benefits being received from the new IS . The major emphasis of these analysis has been the users of the IS, and both the analysis are subject to their response. The report also contains a brief description of the technical aspects of the IS. The hardware setup and the software support that are needed to operate the IS are described briefly. The cost of implementing the project, including the purchase of additional hardware, software and training is also mentioned. Although it is always critical to assess the amount of value addition that a particular IS brings into effect, CETS has had very lucid and prominent impact in improving the operation and efficiency of the organization. These impacts are pointed out clearly throughout this report. Introduction The pace of globalization has influenced all businesses to undergo sufficient changes in their operational procedures. Often businesses need to automate their existing operations in order to cope up with the rest of the business world...

Words: 2683 - Pages: 11

Premium Essay

Air Cargo Security Issues

...procedures for the security screening of air cargo. The law required that by February 2009, 50 percent of all air cargo on passenger aircraft would be security screened, and by August 2010, all air cargo traveling on passenger aircraft must be 100 percent screened individually. The requirement presents numerous logistical, financial, and technological challenges to airlines and all entities involved in air cargo shipping. The Transportation Security Administration has lessened some of the burden by creating the Certified Cargo Screening Program, enabling the screening of cargo by certified shippers prior to aircraft delivery. On August 3, 2007, President Bush signed the Implementing Recommendations of the 9/11 Commission Act of 2007, commonly known as the 9/11 Act, into law. The Act required the Transportation Security Administration to establish a system for the 100 percent security screening of all cargo transported on passenger aircraft within three years. Additionally, the 9/11 Act required that 50 percent of air cargo would be screened on passenger aircraft by February, 2009. Air cargo handlers in all aspects of the logistical arena have responded well to the 50% mandate, but the 100% requirement poses serious logistical and financial hurdles to airlines, cargo handlers, and freight forwarders if it is to succeed (Transportation Security Administration {TSA}, 2009). In an effort to achieve the 100 percent screening of cargo and protect the American public as much as...

Words: 3343 - Pages: 14

Premium Essay

Cisco Csr Report

...< Previous View 2012 Cisco CSR Report Website How to Use This Report We Welcome Your Feedback C1 Supply Chain Overview Our Supply Chain Embedding Sustainability in Core Business Processes Partnering with Suppliers to Improve Performance and Build Capability Working with Industry Groups Watch the Video! Supply Chain We expect our suppliers to meet the same high standards on ethics, labor rights, health and safety, and the environment that we apply to our own people and operations. Cisco works closely with suppliers to manage these sustainability issues and improve their performance throughout the supply chain and at every stage of the lifecycle of our products. We look to use our relationships with our network of suppliers and peer companies to multiply the impact we can have on sustainability in the information and communications technology (ICT) supply chain. 2012 Cisco CSR Report < Previous View 2012 Cisco CSR Report Website How to Use This Report We Welcome Your Feedback C2 Supply Chain > Overview Our Supply Chain Embedding Sustainability in Core Business Processes Partnering with Suppliers to Improve Performance and Build Capability Working with Industry Groups Overview These first five pages give readers an overview of Cisco’s objectives, key challenges, progress, and performance with regard to Supply Chain. We have used this overview as part of our Executive Summary, which can be downloaded here. We focus our performance...

Words: 9439 - Pages: 38

Premium Essay

Acct 504 Case 2

...Prepared for LJB Company President Evaluation of Internal Controls Prepared by XXXX XXXXX xxxx@msn.com ACCT 591 Acct Fin: Managerial Use,Anlys XXXXXXXXXXXXXX September 12, 20xx DeVry University Table of Contents Introduction of Evaluation 2 New Regulations – Public vs. Private 3 Current Internal Controls – Good 4 Current Internal Controls – Need Improvements 5 Reflection 7 References 8 Introduction of Evaluation My accounting firm was asked to evaluate the LJB Company for evidence of Internal Control issues. It is also my understanding that your company, LJB Company, wishes to move forward and become a public entity. I’m pleased my firm can be of assistance in helping your company make this transaction. First, we must review any new rules or regulations that apply to private companies converting public. Good corporate governance within an organization may make a company more attractive to potential buyers, investors, and other capital sources. Under Sarbanes-Oxley, all public traded companies must follow a set of new controls. U.S. corporations are required to maintain an adequate system of internal controls. Corporate executives and boards of directors must ensure these controls are reliable and effective. As with any business, the transformation of going from a private to public requires some extensive planning and preparation. It is recommended LJB being a relatively small sized company in terms of its employees should re-evaluate the...

Words: 2028 - Pages: 9

Premium Essay

Ethic and Corporate

...Ethic and Corporate Responsibility 2 Nehemiah Leary Legal 500 Professor Morris In our society, we as consumers are continuously being bombarded by advertising ads on T.V and billboards and highways to promote the latest product. a user isn’t always looking at the product or reading the safety warning on the item; they are only looking at who and what athlete and movie star promotes this latest product. For example, Gatorade always uses high profile athletes or famous people to promote its product. These ads provide a sublime message. These Ads are gear to get the consumer to buy their product. In order for me to be like MJ, I have to drink Gatorade. There has been a shift over the last couple of years in product safety. According to Chandra, “product safety has become a major problem for businessmen, consumers and the government” (Chandran, 1979). Advertising can be both influential and persuasive. It presents an issue of product safety. The Consumer Product Safety Commission threatened to ask Congress to give it greater authority. Advertising is protected under the First Amendment, but there has to be limits. “While advertising does not directly contribute to all product related accidents, it does, inadvertently, have the power to promote unsafe behavior” (Chandran, 1979). Advertising indirectly contributes to the problem of consumer product safety. “Advertisers and advertising agencies should therefore do more to educate consumers in a safe and prudent use of products...

Words: 2977 - Pages: 12

Premium Essay

Term Paper

...CHAPTER 1 MANAGERIAL ACCOUNTING IN THE INFORMATION AGE CHAPTER Introduction FINANCIAL ACCOUNTING STRESSES ACCOUNTING CONCEPTS AND PROCEDURES THAT RELATE TO PREPARING REPORTS FOR EXTERNAL USERS OF ACCOUNTING INFORMATION. IN COMPARISON, MANAGERIAL ACCOUNTING STRESSES ACCOUNTING CONCEPTS AND PROCEDURES THAT ARE RELEVANT TO PREPARING REPORTS FOR INTERNAL USERS OF ACCOUNTING INFORMATION. THIS CHAPTER PROVIDES AN OVERVIEW OF THE ROLE OF MANAGERIAL ACCOUNTING IN PLANNING, CONTROL, AND DECISION MAKING. IT ALSO DEFINES IMPORTANT COST CONCEPTS AND INTRODUCES KEY IDEAS THAT WILL BE EMPHASIZED THROUGHOUT THE TEXT. THE CHAPTER CONCLUDES WITH A DISCUSSION OF THE INFORMATION AGE AND THE IMPACT OF INFORMATION TECHNOLOGY ON BUSINESS, A FRAMEWORK FOR ETHICAL DECISION-MAKING AND THE ROLE OF THE CONTROLLER AS THE TOP MANAGEMENT ACCOUNTANT. NOTE THAT YOU CAN ENHANCE AND TEST YOUR KNOWLEDGE OF THE CHAPTER USING WILEY’S ONLINE RESOURCES, THE SELF-ASSESSMENT QUIZ AND REVIEW PROBLEMS AT THE END OF THE CHAPTER. Objectives, Terms, and Discussions LO1 State the primary goal of managerial accounting. GOAL OF MANAGERIAL ACCOUNTING Managers need to plan and control their operations and make a variety of decisions. The goal of managerial accounting is to provide the information managers need for planning, control, and decision making. LO2 Describe how budgets are used in planning. Planning A plan communicates a company's goals to employees and specifies the resources needed...

Words: 7726 - Pages: 31